Malware Triage Analyst

Alex is an incident responder on her company’s cybersecurity team. After a year, she is looking to advance her skills. Her love for research and analysis makes her a perfect fit for malware triage analysis.

From Incident Response to Malware Triage Analysis

Alex is an incident responder on her company’s cybersecurity team. After a year in this role, she wanted an opportunity to further specialize her skillset. She has demonstrated a passion for analysis and research, always digging deeper to uncover the source of a problem. Her manager has noticed that Alex has an exceptional ability for critical thinking, catching anomalies many of her teammates miss. After Alex expressed her desire to advance in her career during her annual review, her manager gave her the opportunity to move into a malware triage role.  In this new position, she could exercise her love for analysis and problem solving and continue to be challenged in an advanced, specialty area of cybersecurity.

Suggested Learning Track

The following is the suggested learning program for professionals looking to transition into a Malware Triage Analyst role. Professionals can choose between Windows System Analysis and Live System Analysis, based on their organization's needs.

Endpoint Live Forensics

During this training, students learn how to identify abnormal activity and investigate a running Windows or Linux system that may have been compromised.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 CPE/CEU Credit

Behavioral Malware Analysis

Using system monitoring tools and analytic software, students will analyze real-world malware samples in a training environment, building secure labs, classifying malware, analyzing behavior, and documenting findings.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 College Credit

Different from the Rest

At Focal Point, we are passionate about building stronger cybersecurity teams.

Flexible Delivery

Focal Point offers multiple training delivery methods - classroom, onsite, and online. Based on your needs, you can use one of our training facilities, go online, or we can bring our team to you.

70% Hands-On

We believe in the power of doing. Lectures are limited, and students spend most of their time building and testing real-world skills in our lab environments.

Top Instructors

Leverage the same world-class training used by cyber experts in the military and Fortune 500. Our instructors receive an average 4.9/5 rating for knowledge and delivery year after year.

Featured Learning Tracks

See where cyber workforce development can take your team.
SOC Analyst I
Learning Track

Cyber Threat Analyst I

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
Learn More
Malware Reverse Engineer
Learning Track

Malware Reverse Engineer

Olivia is a software developer who has been with her company for 6 years and is transitioning to a Reverse Engineering role.
Learn More
App Developer
Learning Track

Application Developer

Chris is a junior-level web developer who wants learn new coding languages, so he can expand his skillset to include application development.
Learn More